A Systems Analysis Of Insider Data Exfiltration

Download A Systems Analysis Of Insider Data Exfiltration full books in PDF, epub, and Kindle. Read online free A Systems Analysis Of Insider Data Exfiltration ebook anywhere anytime directly on your device. Fast Download speed and no annoying ads. We cannot guarantee that every ebooks is available!

A Systems Analysis of Insider Data Exfiltration

A Systems Analysis of Insider Data Exfiltration
Author :
Publisher :
Total Pages : 110
Release :
ISBN-10 : OCLC:1120725555
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis A Systems Analysis of Insider Data Exfiltration by : Nana Essilfie-Conduah (S.M.)

Download or read book A Systems Analysis of Insider Data Exfiltration written by Nana Essilfie-Conduah (S.M.) and published by . This book was released on 2019 with total page 110 pages. Available in PDF, EPUB and Kindle. Book excerpt: It has become common place to hear of data breaches. Typically, we hear of external hackers as the perpetrators, however, the reality is there is a high frequency of threats from insiders within an organization and that the cost and challenge in detecting these threats is considerable. The issue has affected companies in multiple private sectors (finance, retail) and the public sector is also at risk as apparent with the Edward Snowden and Chelsea Manning cases. This thesis explores the current space of insider threats in terms of frequency, cost and complexity in attack assessment. It also explores the multiple perspectives and stakeholders that make up the complex insider threat systems. Insights from multiple insider threat cases as well as subject matter experts in cyber security were used to model and pinpoint the high value metrics around access management and logging that will aid audit efforts. Following this an exploration of kill chains, blockchain technology and hierarchical organization exploration is made. Research findings highlight the wide reach of excessive privileges and the crucial role resource access and event logging of stakeholder actions plays in the success of insider threat prevention. In response to this finding a proposal is made for a combined solution that aims to provide an easy and accessible interface for searching and requesting access to resources that scales with an organization. This proposal suggests the capitalization of the transparent and immutable properties of blockchain to ledger the requesting and approval of file access through dynamic and multi user approval logic. The solution combines simplistic file-based resource access in an accessible manner with a multi layered security approach that adds further hurdles for bad actors but provides a visible and reliable look back on an immutable audit path.


A Systems Analysis of Insider Data Exfiltration Related Books

A Systems Analysis of Insider Data Exfiltration
Language: en
Pages: 110
Authors: Nana Essilfie-Conduah (S.M.)
Categories:
Type: BOOK - Published: 2019 - Publisher:

DOWNLOAD EBOOK

It has become common place to hear of data breaches. Typically, we hear of external hackers as the perpetrators, however, the reality is there is a high frequen
Towards Reducing the Data Exfiltration Surface for the Insider Threat
Language: en
Pages:
Authors:
Categories:
Type: BOOK - Published: 2016 - Publisher:

DOWNLOAD EBOOK

Unauthorized data exfiltrations from both insiders and outsiders are costly and damaging. Network communication resources can be used for transporting data illi
The CERT Guide to Insider Threats
Language: en
Pages: 431
Authors: Dawn M. Cappelli
Categories: Computers
Type: BOOK - Published: 2012-01-20 - Publisher: Addison-Wesley

DOWNLOAD EBOOK

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about
Insider Threat
Language: en
Pages: 254
Authors: Michael G. Gelles
Categories: Business & Economics
Type: BOOK - Published: 2016-05-28 - Publisher: Butterworth-Heinemann

DOWNLOAD EBOOK

Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes e
Do Innovative Thinkers Pose an Increased Insider Threat?
Language: en
Pages: 76
Authors: U. S. Military
Categories:
Type: BOOK - Published: 2019-08-25 - Publisher:

DOWNLOAD EBOOK

The malicious insider threat is one of the most nefarious of potential cyber security breaches. There have been egregious insider data thefts in the last 10 yea